Richard’s Law Of ComputerSecurityEither don’t buy a computer systemand if you are buying a computersystem don’t turn it on.
Basic Principle of Security C - Confidentiality I - Integrity A - Availability
ConfidentialityConfidentiality refers to preventing the disclosure ofinformation to unauthorized individuals or systems.IntegrityIn information security, data integrity meansmaintaining and assuring the accuracy and consistencyof data over its entire life-cycle.AvailabilityFor any information system to serve its purpose, theinformation must be available when it is needed.
IntroductionHacking is neither legal nor illegal it is just aconcept to bypass a security mechanism of anysystem , server or any network withauthentication and authorization or withoutauthentication and authorization.
Types Of Hacker1. White hat/ Ethical hackers2. Black hat hackers/ Crackers3. Grey hat hackers4. Blue hat hackersAdditional category1. Neophyte2. Hacktivist3. Elite hacker4. Script kiddie
White hat / Ethical hacker• If someone is bypassing security or breachingsecurity with authentication and authorization iscalled ethical hacker• A white hat hacker breaks security for non-malicious reasons, perhaps to test their ownsecurity system or while working for a securitycompany which makes security software. Theterm "white hat" in Internet slang refers to anethical hacker.
Black hat hackerA "black hat" hacker is a hacker who "violates computersecurity for little reason beyond maliciousness or forpersonal gain"They choose their targets using a two-pronged processknown as the "pre-hacking stage".
Blue hat hackerA blue hat hacker is someone outside computersecurity consulting firms who is used to bug test asystem prior to its launch, looking for exploits sothey can be closed. Microsoft also uses the termBlue Hat to represent a series of security briefingevents.
Grey hat hackerA grey hat hacker is a combination of a Black Hatand a White Hat Hacker. A Grey Hat Hacker maysurf the internet and hack into a computer systemfor the sole purpose of notifying the administratorthat their system has been hacked, for example.Then they may offer to repair their system for asmall fee.[